IT in Manufacturing


Protecting industrial networks with resilient defence

June 2025 IT in Manufacturing

In the IIoT and smart manufacturing landscape, network security is no longer just about preventing hacking or data breaches – operational stability and productivity now depend on it. For operational technology (OT) networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin guarded uptime and resilient defence (GUARD).

Traditional network security primarily focuses on perimeter defence, such as firewalls, intrusion detection systems and anomaly monitoring. These defence mechanisms, essential for perimeter protection, may not fully address internal threats or device-level vulnerabilities.

Let’s take as an example a small to medium-sized water treatment plant responsible for providing clean water to a municipality. Because downtime affects public health, it must be avoided at all costs. The plant is also subject to regulatory compliance requirements that mandate cyber security measures, requiring a network security solution that guarantees continuous operation and meets stringent compliance standards; but it has limited resources for incident response and recovery and is mostly concerned with ensuring that the plant continues to operate.

For this scenario, the concept of Moxa’s GUARD is a perfect fit. GUARD goes beyond network boundary protection. It embeds security within every network node while ensuring seamless integration with existing OT devices. This inherent resilience enables the water treatment plant to recover without help and maintain operations with minimal disruption, even during a cyber attack.

Three important core strategies are:

• Guarded uptime: For industrial networks, uptime equals productivity and revenue. Significant losses result from any network downtime. Hence, the quick recovery of critical network devices from attacks or failures is paramount. Power redundancy, network redundancy protocols and fast restoration of the configuration are crucial in minimising production disruption.

• Resilience from within: Built-in intrinsic defence, unlike traditional add-on security architectures, embeds security into devices so that network infrastructure achieves security by design. This includes IEC 62443-4-1 certified secure development life cycle, ensuring products adhere to the highest security standards, from design to operation. It also includes IEC 62443-4-2 Security Level 2 hardened devices, covering everything from routers to Ethernet switches, with built-in multilayer network segmentation to block lateral movement of internal threats.

• Collaboration and futureproofing: GUARD focuses on safeguarding existing networks while integrating new devices and technologies. Here, every proprietary network redundancy innovation, such as Moxa’s Turbo Ring or Turbo Chain, is compatible with standardised technologies such as MRP or STP/RSTP. A network management system supports third-party device monitoring and management, enhancing overall network visibility and operational efficiency.

When weighing up intrinsic vs add-on security, it is important to ask:

• Is your goal to protect the entire network, not just its boundaries?

• Do you want to strengthen your network without the added complexity of external security overlays?

A ‘yes’ to both questions means you must look for intrinsic security. As the name suggests, the security is built directly into the network devices – routers, switches and serial device servers. This security-by-design approach, certified through IEC 62443-4-1, strengthens your network from the inside out making it more resilient to attacks. Think of it as building a fortress instead of just hiring guards.

It is also important to consider:

• What are the biggest challenges you face in maintaining the reliability and security of your industrial network?

• What is your current network redundancy strategy?

Although threat detection is vital, prioritising guarded uptime and quick recovery is key. Network redundancy protocols, rapid configuration recovery and secure device design work together to minimise the impact of any security event on your operations. To avoid revenue loss from downtime, focus on maintaining smoothly operating systems. Use the network topology to help resolve the network issues, if there are any.

Seamless integration of network security with your existing infrastructure and future technologies is also essential. Questions to ask are:

• Do you have a mix of legacy and modern equipment on your network?

• How do you handle patching and vulnerability management for your industrial devices?

Broader compatibility with existing network redundancy protocols and network management supporting third-party device monitoring provides enhanced visibility and control across your entire industrial network. It’s crucial to find a solution that enhances your operations without replacing your current investments.

The perfect combination of resilience and stability

GUARD is more than just another security solution, it represents a new mindset of ‘intrinsic resilience’. It breaks away from traditional perimeter-only protection frameworks by embedding security into every network node and tightly integrating uptime with resilient defence to achieve seamless operational continuity. To address the rising complexity and importance of IIoT and OT networks, Moxa seeks to strengthen industrial network security and operational stability, aiming to become a leading industry reference for network architecture.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...
Bombardier expands adoption of Siemens Xcelerator for aircraft developmen
Siemens South Africa IT in Manufacturing
Bombardier has expanded its adoption of the Siemens Xcelerator portfolio of industry software for aircraft development.

Read more...
The DeepSeek effect: navigating AI’s new frontier
IT in Manufacturing
DeepSeek has emerged as a game-changer in artificial intelligence, offering a robust platform redefining how businesses approach AI integration. This change is especially important since it opens up AI to a wider range of organisations, including small and medium-sized enterprises that could have previously been priced out of the market.

Read more...
Automation, is it 2049 already?
Schneider Electric South Africa IT in Manufacturing
It would come as no surprise that AI and ML are at the forefront of the increased efficiency movement, and are vital cogs in this sophisticated automated machine. A development that is extremely exciting, is autonomous systems.

Read more...